SlideShare a Scribd company logo
1 of 23
Managing IT Security for Extension and Outreach Offices Theresa Semmens NDSU Chief IT Security Officer October, 2009
     Presentation Outline Security Guidelines Email Workstation Wireless External Mobile Device Security Protection of Confidential and Private Data Online Financial Transactions Those *!@&$ NDSU network services Dual Support with the ND Association of Counties
   NDSU E-mail What is secure Encrypted User name and password  Email messages and attachments Subject to privacy laws HIPAA GLBA FERPA ND Public Open Records Century Code Using personal e-mail address and equipment for NDSU Business Can be subject to ND Public Open Records Century Code
Workstation Users must have unique login and password Operating system and office software current with latest patches  Anti-virus software and firewall installed, enabled and active Confidential/private data is not accessible or viewable by public Log off computer when done or away from desk Set a password protected screensaver
Workstation Area Confidential/sensitive information not available for public view Protected hard copy documentation stored in locked file cabinet Manipulated hard copy documentation Tidy desk area
Wireless Access Wireless access in the office  Open vs. Secured Access available only to those who need it Wireless access outside of the office Public access Not recommended  Working with confidential private data Use for personal banking Purchasing merchandise online Use NDSU Webmail client to send and receive email – do not send attachments, message body should not contain sensitive information
Laptop Security ,[object Object]
Back up all data, and make use of encryption features when you do so.
Hard drive and external storage is encrypted.
Laptop must be labeled and identified,[object Object]
Phlushing the Phish! What is NDSU doing? What can you do? Recent Spear Phishing Attacks
             Confidential/Private Data Defined and classified in NDUS 1901.2 Examples:  Pesticide Program Master Gardeners 4-H Research What is allowable for use and storage
           Employees & Volunteers Must sign confidentiality agreements Background checks required* Receive formal, documented training  *Above point required if handling electronic financial transactions
           Social Security Numbers Do not use as an identifier on  Files Spread sheets Data bases Correspondence  Any files/documents containing SSN data must be secured and available only to those who have a need to know
       Credit Card Information Do not store Full credit card number (only last four digits) CVV2 number Exp. Date Receipts Only allow last four digits on receipt No CVV2 number No exp. Date Do not accept credit card transactions over email If received over voice mail, delete immediately Must have separation of duties for acceptance of credit cards
More Safeguards Non-disclosure (suppression) Farmers/Ranchers Parents Children Requests for lists of members Health questionnaires (4-H) Date of Birth combined with name Information posted to Web sites
Use & Disposal of Protected Data Encrypt or password protect on electronic devices Back up regularly Allow only those who have a need to know access to data Use only where necessary Dispose of properly
             Personnel  & Volunteer Files Stored in locked cabinet not in public area If request is made to view personnel file Dean and General Counsel to approve request Log request, date, time Viewer must sign log form Only allow what is considered public information to be viewed Purge according to data retention policies Shred with cross cut shredder, burn, using document destruction service
     Suspected Data Breach For computer related security issues contact your supervisor Document reasons you suspect breach of data Do not move, touch, alter equipment or anything related to the breach  Do not attempt to do your own investigation
     NDSU network services E-mail accounts Alias Shared E-mail box space Changing electronic ID Non-employee accounts Affiliate vs. Guest accounts
Alias E-mail Account ,[object Object]
Does not require password
Owner responsible for removing and adding usersSender Alias Recipient Recipient Recipient

More Related Content

What's hot

Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacySolix Technologies, Inc
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Legal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataLegal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataShirisha Jella
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records ManagersJesse Wilkins
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonNicholas Davis
 
Healthcare Information Security Secure Sensitive Communications Within The ...
Healthcare Information Security   Secure Sensitive Communications Within The ...Healthcare Information Security   Secure Sensitive Communications Within The ...
Healthcare Information Security Secure Sensitive Communications Within The ...Nicholas Davis
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2jodimw
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoMegan Bell
 

What's hot (17)

Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Data protection act
Data protection act Data protection act
Data protection act
 
Chapter1
Chapter1Chapter1
Chapter1
 
Legal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataLegal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students data
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
 
Threats
ThreatsThreats
Threats
 
Healthcare Information Security Secure Sensitive Communications Within The ...
Healthcare Information Security   Secure Sensitive Communications Within The ...Healthcare Information Security   Secure Sensitive Communications Within The ...
Healthcare Information Security Secure Sensitive Communications Within The ...
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
IoT
IoTIoT
IoT
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens Info
 

Viewers also liked

I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)Bruce Sundeen
 
Presentación sobre Medina Azahara
Presentación sobre Medina AzaharaPresentación sobre Medina Azahara
Presentación sobre Medina AzaharaIES Villarrubia
 
Photography Presentation
Photography PresentationPhotography Presentation
Photography Presentationburrendav
 
Legislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New RealitiesLegislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New RealitiesBruce Sundeen
 
Responsive web design - tips & tricks
Responsive web design - tips & tricksResponsive web design - tips & tricks
Responsive web design - tips & tricksRavi Bhadauria
 
Typography and Colors for GUI Designers
Typography and Colors for GUI DesignersTypography and Colors for GUI Designers
Typography and Colors for GUI DesignersRavi Bhadauria
 

Viewers also liked (7)

Photography Tips
Photography TipsPhotography Tips
Photography Tips
 
I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)
 
Presentación sobre Medina Azahara
Presentación sobre Medina AzaharaPresentación sobre Medina Azahara
Presentación sobre Medina Azahara
 
Photography Presentation
Photography PresentationPhotography Presentation
Photography Presentation
 
Legislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New RealitiesLegislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New Realities
 
Responsive web design - tips & tricks
Responsive web design - tips & tricksResponsive web design - tips & tricks
Responsive web design - tips & tricks
 
Typography and Colors for GUI Designers
Typography and Colors for GUI DesignersTypography and Colors for GUI Designers
Typography and Colors for GUI Designers
 

Similar to Managing It Security

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEJonathan Ezor
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security cschumley
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practicecschlein
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentationbrentcarey
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseIpro Tech
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Security environment
Security environmentSecurity environment
Security environmentJay Choudhary
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureEuropean Collaboration Summit
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identitywegdam
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the HourVijay Dalmia
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 

Similar to Managing It Security (20)

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
Ppt Employee Pres
Ppt Employee PresPpt Employee Pres
Ppt Employee Pres
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practice
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentation
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident Response
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security environment
Security environmentSecurity environment
Security environment
 
Unit 3
Unit 3Unit 3
Unit 3
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
 
Cybersmart
CybersmartCybersmart
Cybersmart
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identity
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 

More from Bruce Sundeen

Making the Best of Economic Uncertainties
Making the Best of Economic UncertaintiesMaking the Best of Economic Uncertainties
Making the Best of Economic UncertaintiesBruce Sundeen
 
Research Update 2009
Research Update 2009Research Update 2009
Research Update 2009Bruce Sundeen
 
Taking Goodto Great10 12
Taking Goodto Great10 12Taking Goodto Great10 12
Taking Goodto Great10 12Bruce Sundeen
 
Legislative Advocacy National Fcs
Legislative Advocacy National FcsLegislative Advocacy National Fcs
Legislative Advocacy National FcsBruce Sundeen
 

More from Bruce Sundeen (6)

Risk Communication
Risk CommunicationRisk Communication
Risk Communication
 
Making the Best of Economic Uncertainties
Making the Best of Economic UncertaintiesMaking the Best of Economic Uncertainties
Making the Best of Economic Uncertainties
 
Research Update 2009
Research Update 2009Research Update 2009
Research Update 2009
 
Taking Goodto Great10 12
Taking Goodto Great10 12Taking Goodto Great10 12
Taking Goodto Great10 12
 
Extension
ExtensionExtension
Extension
 
Legislative Advocacy National Fcs
Legislative Advocacy National FcsLegislative Advocacy National Fcs
Legislative Advocacy National Fcs
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Managing It Security

  • 1. Managing IT Security for Extension and Outreach Offices Theresa Semmens NDSU Chief IT Security Officer October, 2009
  • 2. Presentation Outline Security Guidelines Email Workstation Wireless External Mobile Device Security Protection of Confidential and Private Data Online Financial Transactions Those *!@&$ NDSU network services Dual Support with the ND Association of Counties
  • 3. NDSU E-mail What is secure Encrypted User name and password Email messages and attachments Subject to privacy laws HIPAA GLBA FERPA ND Public Open Records Century Code Using personal e-mail address and equipment for NDSU Business Can be subject to ND Public Open Records Century Code
  • 4. Workstation Users must have unique login and password Operating system and office software current with latest patches Anti-virus software and firewall installed, enabled and active Confidential/private data is not accessible or viewable by public Log off computer when done or away from desk Set a password protected screensaver
  • 5. Workstation Area Confidential/sensitive information not available for public view Protected hard copy documentation stored in locked file cabinet Manipulated hard copy documentation Tidy desk area
  • 6. Wireless Access Wireless access in the office Open vs. Secured Access available only to those who need it Wireless access outside of the office Public access Not recommended Working with confidential private data Use for personal banking Purchasing merchandise online Use NDSU Webmail client to send and receive email – do not send attachments, message body should not contain sensitive information
  • 7.
  • 8. Back up all data, and make use of encryption features when you do so.
  • 9. Hard drive and external storage is encrypted.
  • 10.
  • 11. Phlushing the Phish! What is NDSU doing? What can you do? Recent Spear Phishing Attacks
  • 12. Confidential/Private Data Defined and classified in NDUS 1901.2 Examples: Pesticide Program Master Gardeners 4-H Research What is allowable for use and storage
  • 13. Employees & Volunteers Must sign confidentiality agreements Background checks required* Receive formal, documented training *Above point required if handling electronic financial transactions
  • 14. Social Security Numbers Do not use as an identifier on Files Spread sheets Data bases Correspondence Any files/documents containing SSN data must be secured and available only to those who have a need to know
  • 15. Credit Card Information Do not store Full credit card number (only last four digits) CVV2 number Exp. Date Receipts Only allow last four digits on receipt No CVV2 number No exp. Date Do not accept credit card transactions over email If received over voice mail, delete immediately Must have separation of duties for acceptance of credit cards
  • 16. More Safeguards Non-disclosure (suppression) Farmers/Ranchers Parents Children Requests for lists of members Health questionnaires (4-H) Date of Birth combined with name Information posted to Web sites
  • 17. Use & Disposal of Protected Data Encrypt or password protect on electronic devices Back up regularly Allow only those who have a need to know access to data Use only where necessary Dispose of properly
  • 18. Personnel & Volunteer Files Stored in locked cabinet not in public area If request is made to view personnel file Dean and General Counsel to approve request Log request, date, time Viewer must sign log form Only allow what is considered public information to be viewed Purge according to data retention policies Shred with cross cut shredder, burn, using document destruction service
  • 19. Suspected Data Breach For computer related security issues contact your supervisor Document reasons you suspect breach of data Do not move, touch, alter equipment or anything related to the breach Do not attempt to do your own investigation
  • 20. NDSU network services E-mail accounts Alias Shared E-mail box space Changing electronic ID Non-employee accounts Affiliate vs. Guest accounts
  • 21.
  • 22. Does not require password
  • 23. Owner responsible for removing and adding usersSender Alias Recipient Recipient Recipient
  • 24.
  • 26. Owner required to change password when users leave or are added to groupSender Shared Recipient Recipient Recipient
  • 27. Electronic ID Official Format = FirstName.LastName Full-time employees and Students can change EID at http://enroll.nodak.edu Non-employees/students must request change Change subject to previous ownership of “name space.” Name change due to marriage/divorce – must go through HR with proper documentation Employees have 500 MB e-mail box. Request to increase must be sent through Helpdesk.
  • 28. Affiliate vs. Guest Accounts Services available: desktop_auth, Blackboard, Library, Wireless Must be “sponsored” by department Affiliate accounts for periods longer than one week Guest accounts for periods less than one week E-mail requires completion of Non-employee ID form
  • 29. Managing IT Security for Extension and Outreach Offices Theresa Semmens NDSU Chief IT Security Officer October, 2009